| Comsecuris/shannonRE |
175 |
|
0 |
0 |
over 9 years ago |
0 |
|
0 |
|
Python |
| Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S6 |
| smeso/MTPwn |
149 |
|
0 |
0 |
over 8 years ago |
0 |
|
1 |
gpl-3.0 |
C |
| PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086) |
| grant-h/ShannonBaseband |
119 |
|
0 |
0 |
about 2 years ago |
0 |
|
8 |
mit |
C |
| Scripts, plugins, and information for working with Samsung's Shannon baseband. |
| oranav/i9300_emmc_toolbox |
82 |
|
0 |
0 |
about 8 years ago |
0 |
|
11 |
gpl-3.0 |
C |
| Samsung Galaxy S3 GT-I9300 eMMC toolbox |
| quarkslab/samsung-trustzone-research |
64 |
|
0 |
0 |
over 6 years ago |
0 |
|
0 |
other |
Python |
| Reverse-engineering tools and exploits for Samsung's implementation of TrustZone |
| k0mraid3/K0mraid3s-System-Shell-PREBUILT |
26 |
|
0 |
0 |
about 3 years ago |
0 |
|
1 |
mit |
|
| K0mraid3s System Shell Exploit |
| frederic/exynos-usbdl |
23 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
gpl-3.0 |
C |
| Unsigned code loader for Exynos BootROM |
| akhilkedia/KnoxMessengerExploitPOC |
10 |
|
0 |
0 |
about 6 years ago |
0 |
|
0 |
gpl-3.0 |
Java |
| This is a proof of concept exploit which bypasses root detection in Samsung's Knox Messenger. This has been reported to Knox Messenger team. |
| IAmTapped/Unlock-All-Android-Phone |
8 |
|
0 |
0 |
about 3 years ago |
0 |
|
|
mit |
|
| Tool to unlock any android phone |
| frederic/SVE-2016-7930 |
5 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
gpl-3.0 |
|
| Proof-of-Concept for SVE-2016-7930 : multiple buffer overflows in Samsung Galaxy bootloader |